Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lin, Han-Yu | en_US |
dc.contributor.author | Wu, Tzong-Sun | en_US |
dc.contributor.author | Huang, Shih-Kun | en_US |
dc.contributor.author | Yeh, Yi-Shiung | en_US |
dc.date.accessioned | 2014-12-08T15:48:08Z | - |
dc.date.available | 2014-12-08T15:48:08Z | - |
dc.date.issued | 2010-10-01 | en_US |
dc.identifier.issn | 0898-1221 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.camwa.2010.07.015 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/32102 | - |
dc.description.abstract | For facilitating the confidential transaction with delegation such as on-line proxy auction and business contract signing by an authorized proxy, we propose an efficient proxy signcryption scheme from pairings. Our scheme allows an original signer to delegate his signing power to a proxy one such that the latter can signcrypt a plaintext on behalf of the former. The signcrypted message can only be decrypted by a designated recipient who is also responsible for verifying the recovered proxy signature. To deal with a later dispute over repudiation, the designated recipient can easily announce the ordinary proxy signature for public verification without extra computational efforts. To guarantee the realistic applicability, we demonstrate that our scheme outperforms previous works in terms of functionalities and computational efficiency. Moreover, the security requirement of confidentiality against indistinguishability under adaptive chosen-ciphertext attacks (IND-CCA2) and that of unforgeability against existential forgery under adaptive chosen-message attacks (EF-CMA) are proved in random oracle models. (C) 2010 Elsevier Ltd. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Proxy | en_US |
dc.subject | Signcryption | en_US |
dc.subject | Bilinear pairing | en_US |
dc.subject | Warrant | en_US |
dc.subject | Public key encryption | en_US |
dc.title | Efficient proxy signcryption scheme with provable CCA and CMA security | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.camwa.2010.07.015 | en_US |
dc.identifier.journal | COMPUTERS & MATHEMATICS WITH APPLICATIONS | en_US |
dc.citation.volume | 60 | en_US |
dc.citation.issue | 7 | en_US |
dc.citation.spage | 1850 | en_US |
dc.citation.epage | 1858 | en_US |
dc.contributor.department | 資訊工程學系 | zh_TW |
dc.contributor.department | Department of Computer Science | en_US |
Appears in Collections: | Articles |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.